waiting for content

Posted on 2013-11-06
Last Modified: 2013-11-11

i have sccm2012 installed on windows 2012.
boundary configured, boundary group is configured, DP is ok, content is successfuly distributed to distribution point, Bits is enabled.

why is the deployment is in waiting for content?????

please help banging my head for 2 days.

Question by:shahzebasif
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2

Assisted Solution

by:Leon Taljaard
Leon Taljaard earned 250 total points
ID: 39629362

Maybe have a look at this link and see if it might help you, its for server 2008 but it might work on 2012

This could also help, if you are running SCCM 2012 SP1, this is a hotfix that you can apply.

Hope this helps

Author Comment

ID: 39629401
i have done all these things....but still not working.

Expert Comment

by:Leon Taljaard
ID: 39629405
Not sure how your boundary is setup, but if it is a AD site boundary maybe try changing it to a IP range or subnet type and try again.
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.


Author Comment

ID: 39629429
its IP address range boundary.

Accepted Solution

shahzebasif earned 0 total points
ID: 39629475
i found the was due to Mcafee. it is blocking download to windows folder.
LVL 18

Expert Comment

by:Mike T
ID: 39635781
McAfee: the antivirus virus...

Author Comment

ID: 39636564
yes Mcafee antivirus.

Author Closing Comment

ID: 39638329
thanks for the support

Featured Post

Forrester Webinar: xMatters Delivers 261% ROI

Guest speaker Dean Davison, Forrester Principal Consultant, explains how a Fortune 500 communication company using xMatters found these results: Achieved a 261% ROI, Experienced $753,280 in net present value benefits over 3 years and Reduced MTTR by 91% for tier 1 incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question